![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103200/cloud-400x200.jpg)
Organizations and the cloud: How they use it and how they secure it
The Cloud Security Alliance (CSA) released the findings of its latest survey which offers insight into companies’ plans regarding cloud and security strategy, cloud services, …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Cloud migrations are taking longer, and require bigger budgets than expected
84% of IT decision-makers across the US and UK say their organization is currently using more than one cloud platform, as businesses’ demands for more choice, flexibility, and …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
How cybercriminals are using malware to target Linux-based operating systems
As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Why security strategies need a new perspective
After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
MFA still offers the best chance of keeping data secure
Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …
![hunt](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103025/soldier-400x200.jpg)
How organizations are arming themselves to combat threats
Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095943/cloud-400x200.jpg)
Top concerns for operating cloud-native technologies
Platform9 announced the results of its research, revealing that 91% of survey respondents cite security, consistent management across environments, high availability, and …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/09173929/network-blue-400x200.jpg)
What is driving NaaS adoption?
In light of the sustained digital transformation needed to navigate the post-COVID world, a study from Aruba reveals a rising interest in Network-as-a-Service (NaaS) as …
![Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/12121737/trendmicro-research-manufacturing-400x200.jpg)
Manufacturing firms turning to the cloud to increase their business agility
European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110241/cloud-400x200.jpg)
Cloud infrastructure spending jumped to $18.6B in 3Q21
According to the International Data Corporation (IDC), spending on compute and storage infrastructure products for cloud infrastructure, including dedicated and shared …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Why organizations should consider adopting cloud governance as code
Cloud governance, in terms of enforcing cost, compliance, and security policies tends to be a pivotal inhibitor to cloud adoption (86% of the respondents) and is a top …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100640/cloud-400x200.jpg)
What is challenging multicloud adoption?
Nutanix announced the findings of its Enterprise Cloud Index (ECI) survey and research report, which measures enterprise progress with cloud adoption. The research showed that …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD